Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers

Ali Bereyhi, Saba Asaad, Ralf R. Muller, Rafael F. Schaefer, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This work studies secure transmission in intelligent reflecting surface (IRS)-assisted MIMO systems when an active eavesdropper is available in the network. We consider a scenario in which the eavesdropper performs an active pilot attack to contaminate the channel estimation at the base station. Invoking the method of secure regularized zero forcing, we develop an algorithm that designs beamforming vectors, as well as phase-shifts at the IRS, such that the active attacker is blinded. Our numerical investigations confirm that the proposed algorithm can suppress the active eavesdropper effectively, as long as legitimate and malicious terminals are statistically distinguishable.

Original languageEnglish (US)
Title of host publicationConference Record of the 54th Asilomar Conference on Signals, Systems and Computers, ACSSC 2020
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Pages718-725
Number of pages8
ISBN (Electronic)9780738131269
DOIs
StatePublished - Nov 1 2020
Event54th Asilomar Conference on Signals, Systems and Computers, ACSSC 2020 - Pacific Grove, United States
Duration: Nov 1 2020Nov 5 2020

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
Volume2020-November
ISSN (Print)1058-6393

Conference

Conference54th Asilomar Conference on Signals, Systems and Computers, ACSSC 2020
Country/TerritoryUnited States
CityPacific Grove
Period11/1/2011/5/20

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications

Keywords

  • Physical layer security
  • active pilot attack
  • intelligent reflecting surfaces
  • secure regularized zero forcing

Fingerprint

Dive into the research topics of 'Secure Transmission in IRS-Assisted MIMO Systems with Active Eavesdroppers'. Together they form a unique fingerprint.

Cite this